They use the free OSINT software found on the internet to find or decide who is a terrorist. Many of them enjoy the feeling of power they from getting people fired from their jobs and put on terrorist investigation lists.

They are freelancers with no oversight or rules. They are only accountable to themselves and their employers. These freelancers thrive on their ability to remain hidden from the public eye. In reality, they could be your socially inept, angry neighbor down the street who is afraid of their own shadow in person. But give them a keyboard and they’ll take your job, your bank account and your freedom.

These freelancers have carved a niche for themselves at the bottom of the OSINT and hacking professions. Today these people who feel so insignificant in their own lives are the cyber warriors for hire by anyone who has an ax to grind and the means to pay them.

They are Hate for Hire.

Freelance Cyber Soldiers

“Our view is that cyber is another operational domain, much as the seas are, much as the land is, much as space is.”Admiral Mike Rogers — Commander US Cyber Command, Director of the NSA, Chief of CSS

Cyber in this context goes way beyond hacker attacks aimed at taking down a website. It is meant to cause damage and even death as a military tool. Because this new frontier is so new, the laws governing “Cyber-war” have yet to drawn up. What has been done so far are a set of guidelines that define who and what can and can’t be targeted.

The Tallinn Manual sets out 95 black letter rules to apply international law to Cyber warfare. In the context of war, there are crimes against humanity that are unique to cyber. All the rules follow established laws of war including targeting civilians is a war crime. This will become very important by the time you get to the bottom of the article and make the remedy very simple to accomplish.

When you compare these rules to the conduct described in the first part of this article series detailing how people exercising 1st Amendment rights were treated by freelancers like Weisburd the pattern of abuse is clear. These rules are trying to describe Laws of War.

Weisburd doesn’t get paid to follow people. After stalking and collecting information his method hasn’t changed since the beginning. “Weisburd has not merely “dismantled” websites. He has harassed individuals engaged in perfectly legal online dissent, threatened their family members, harassed their employers, and harassed their web hosts. He regularly uses lies, disinformation and threats to accomplish these goals. Weisburd decides what is “threatening.”

If we no longer question who gets to spy, then who gets to decide who is a sanctionable enemy of the state? Who gets to run counter-terror operations against whom? What punishment can they meet out?

Non-state actors, just ordinary run of the mill citizens have both the means and the will to carry out (PRIVATE) foreign diplomacy, intelligence, military policy, and carry out military actions. If a freelancer is working for a foreign government doing this to citizens in their own country that are expressing legal free speech, are the freelancer’s actions legal?

“Peacemaker” the website to die for

Coinciding with the unveiling of the Peacemaker website which is a Ukrainian SBU, Ministry of Information, and Ukrainian Defense Ministry undertaking was the opening of a new web blog- Kremlintrolls.comby Andrew Aaron Weisburd (@webradius) which opened a few days earlier than the Ukrainian government site.

In a March 2015 article series I described the true reason for the “Peacemaker” website. It is meant to be a clearinghouse of information to target journalists, activists, people of influence, and people with any connection to them.

Weisburd is currently freelancing for the Ukrainian government and “Peacemaker” has all the earmarks of his involvement. Within a few days of the article peace activist, David Swanson was harassed by someone posing as a Russian embassy officer in WDC.

On January 11th, 2015(“Mirotvorets”) the peacemaker websitewent live with a mission to …“In the future the Peacemaker site will be similar to the site of the Viennese Simon Wiesenthal Center, which since the late 1940s has been focused on tracking and catching Nazi war criminals. In the case of Ukraine, these will be criminals who destroyed the Ukrainian people – the traitors,collaborators, Russian and other mercenaries, and military personnel taking part the undeclared and therefore illegal war by Russia, he concluded…Ukraine’s Ministry of Internal Affairs Advisor Herashchenko wrote. It is also noteworthy that foreign intelligence services have become interested in the Peacemaker site – the CIA, FBI, European intelligence and counterintelligence. The reason in simple. The civilized countries, drawing on information on the pro-Russian militants-terrorists, will be able to create their own databases of suspicious persons and individuals that must be neutralized and isolated from society, he said.”

Oles Buzina

Within one month after the article that stated journalists were going to be targeted offline, Oles Buzina was put on a cleansing list at Peacemaker, geo-located, and executed. Regrettably there is only so much you can do.

Weisburd began openly working for the Ukrainian government in January 2015. “Mirotvorets” has all the earmarks of his involvement from geo-location through OSINT to targeting people designated as political terrorists like Oles Buzina. Weisburd is currently one of the best-known freelancers specializing in this niche area of OSINT. Without trying too hard, we have the motive, means, and opportunity. Normally that could be enough to prompt a criminal investigation which in this case, will never happen.

Peacemaker’s future is meant to be Ukraine’s contribution to NATO and European security by working in conjunction with NATO COE Latvia. The Ukrainian war is just the starting point which is carrying on the work Aaron Weisburd has been perfecting for the last 14 years. They are to geo-locating and targeting people that read, write, or share something in social media that disturbs whatever entity or person the freelancer has a contract with.

Facebook took “Peacemaker” serious enough to ban the profile of the Ukrainian adviser to the Interior Minister Gerashenko who is opening another “cleansing” page for Russian citizens in Syria. “In accordance with the above, I invite all who have information about the Russian citizens taking part in the undeclared war of Russia against the Syrian people to report all the information to the website “Peacemaker” (“Mirotvorets”), where there will be a separate section “Putin’s crimes in Syria and in the Middle East.”

Where Ukraine can get away with it “cleansing” has meant murder, literally. Where that isn’t possible in western countries, Weisburds techniques to ruin the lives and livelihoods of his victims are being put into use.

According to Weisburd‘s February 26thdefinition of what he is doing- “I‘m just trying to do my part to help make bad things happen to bad people who are in the service of the Kremlin. And for the record, I’m not an army of one. I’m more like a one man intelligence service.”

By doing this he is taking large swaths of the US and EU population and making them active Russian agents and soldiers according to Rule 26.7 of the Tallinn Manual-“belonging to” clause. This takes them out of protected civilian status and makes them targetable in the war. As long as no one looks into it, no one will ever know.

March 15th- Not all Kremlin Trolls are in Russia. Not only are they not all in Russia, they are not all in countries sympathetic to – let alone allied with – Russia. In fact, quite a few are in NATO countries. So, when I speak of efforts to combat Russian active measures campaigns as needing a robust counterintelligence component, this is what I’m getting at.

Weisburd’s association with groups like “Peacekeeper” made it possible for him to scale up again. He’s gone from a few thousand people working for him to over 40,000 people just at Peacekeeper alone. The Ukrainian war isn’t the only project he is working on. Iran, Syria, Israel, Palestine, Russia, the Russian world, and American internal politics are some others. He has counter parts in every western country doing the same thing.

May 26th – “Over the past week or two the Kremlin Trolls and their sundry fellow travelers became rather… agitated by previous entries on this site…The traffic generated by each URL provides a snapshot of who each troll’s engaged followers are, and where they appear to reside. Many of the trolls follow each other, so in all likelihood I’ve collected data on the Kremlin Trolls themselves, in addition to their engaged followers… How many of them were using proxy servers or VPNs? Not many. The Internet remains a great place to share, and a terrible place to try and hide.

Geolocation data is summarized in the table below. These countries account for 81% of all the Kremlin Trolls and their engaged followers. The top five countries alone account for 58%. That the USA is ranked first came as something of a surprise. Detailed analysis is ongoing, and I’m unlikely to share the findings publicly.”

If the people he was targeting were active Russian agents like he claims why wouldn’t they use virtual private networks (VPN) to shield themselves like he does? Is it surprising that none of his Kremlin Trolls were in Russia?

In mid-March 2015 I covered Joel Harding’s role in Ukraine’s rapidly developing info-war. Harding was one of the planners for the Iraq war, Afghanistan war, and the invasion of Haiti. He wrote the white papers that US cyber war doctrine is based in and was a part of setting up the NSA. He just discovered what he sees as a munition or real world “live round” to attack journalists and people that shared their views on social media.

“I was in a discussion today about information being used in social media as a possible weapon. The people I was talking with have a tool which scrapes social media sites, gauges their sentiment and gives the user the opportunity to automatically generate a persuasive response. Their tool is called a “Social Networking Influence Engine”. No, not related to the SMISC BAA from a few years ago. Better...Can this be categorized as a munition? I looked through and it does not seem to apply. The implications seem to be profound for the information environment.

The implications may have far-reaching impact beyond Department of Defense. The people who own this tool are in the civilian world and don’t even remotely touch the defense sector, so getting approval from the US Department of State might not even occur to them. If this does require ITAR approval, the corporate world that deals with information and influence will definitely be affected...So… my question is, who at the US Department of State must I coordinate with to get a ruling if this “Social Networking Influence Engine” must receive ITAR approval? “- Joel Harding

I am building a database of planners, operators, logisticians, hackers, and anyone wanting to be involved with special activities I will call ‘inform and influence activities’.

I have received a few different suggestions to help organize operations — of all sorts — against anti-Western elements. No government approval, assistance or funding. This skirts legalities. This is not explicitly illegal and it may not even be legal, at this point. That grey area extends a long way.

I am only trying to assess the availability of people willing to participate in such efforts. Technology, equipment and facility offers are also appreciated. If you would like to be included in my database, please send a tailored resume to joel_harding at yahoo.com. In your resume, I am more interested in actual skills and experience. If you have hands on experience of a less than legal nature, you might not want to admit illegal work. If need be, I will contact you for clarification of your skills.”- Joel Harding

Who is being Located?

When you understand that freelancers do this work for PAC’s, political parties, companies, or just people that pay; every person that reads, has an opinion or shares on social media is being targeted. Ukraine wants to be the clearing house for this work.

What they have found is except through direct hacking many of the news sites and journalists have strong reputations with their readers and remain directly outside their grasp. Instead, they turned to software that finds“influential people” to target through social media networks. Destroy those links and the website gets less social shares and if it is done enough the targets influence diminishes.

Imagine a world where local, state, or national political candidates use freelancers to target each other this way and promote their candidate or destroy their competition. No, wait, don’t imagine it. It’s happening today. “It doesn’t hurt that the Kremlin has an existing base of support in Texas in the form of Ron Paul & Co”. http://t.co/ub537ZsDu6Mon May 11,2015 @webradius

Who are the people Weisburd calls Kremlin trolls and Russian agents? By the way he talks about them you would think they were directly employed by Vladimir Putin. Just ask Ron Paul or anyone that subscribes to the Ron Paul Institute for Peace and Prosperity.

If you are a libertarian, you’re on the lists as a Russian asset. Even Facebook which took down the profile of the Ukrainian Interior Ministry Adviser for soliciting murder is Russian troll owned and against Ukraine.

As a brief example, when you see a graph like this which looks like nothing and spend a few minutes investigating one of the people, it turns into this. In this case, we now have 100 people that potentially influence 52,000+. From there the geolocation work begins. In reality, they are targeting over 1 million people worldwide. Like the human rights activists he learned his trade on, most of these people cross lines on what he would call interests. The same people that support the Occupy Movement are also likely to support human rights around the world. In Weisburd’s words, this makes them good targets.

In this case, it is directly for Ukraine and the Ukrainian emigre PACs like the UCCA. His social connections range across the Ukrainian government, the US OSCE, the Ukrainian Defense Ministry, Azov battalion’s Swedish Nationalist sniper-Mikael Skillt, and it wouldn’t be the same without the authentic Stepan Bandera III. Like his notorious grandfather before him Bandera III is working behind the scenes to destroy democracy and anyone’s life that gets in the way.

Is it Treachery or is it Treason?

It doesn’t matter if you don’t give a damn about the Ukrainian war, saving Donbass people, or anything about Russian culture or politics. It doesn’t matter that you don’t care about Syria and hope the good..?.. IGIL guys make it home for tea. It certainly doesn’t matter that the life you care about is what’s happening in front of you. In the USA or whichever western country you live in, your life is now a freelancer’s meal ticket.

In the first part of this article I detailed how in the UK,a partner of Weisburd’s Glen Jenveyfabricated stories in media about terror plots, falsified and planted evidence, falsified testimony of “terrorist activity” by using online sock puppets, hacking accounts and posting as the account owner, as well as setting up entrapment scams. That’s part of what is going on today.

The Tallinn Manual cyber war rules clearly show all these actions including just labeling normal people as targets is illegal. The “Peacemaker” project and Weisburd’s work are clearly listed as crimes against humanity. Harding’s new project even adds that element of conspiracy to commit crime into the mix.

Does Weisburd know he is committing crimes against his own people? Does he know what he is doing is against international law and is in the category of Crimes Against Humanity?

“I’m the guy who reckons one day he’ll get busted for playing bluegrass louder than the law allows on a Saturday night, & I’m okay w/that.” Sunday May 10, 2015 twitter @webradius

Cyber-war is Real War

The Tallinn Manual is important because if real States have limitations on what they can do, how much more limited should normal citizens be that are working as “freelancers.” To my knowledge no western country allows its citizens to make war on each other or citizens of other countries they are at peace with. The Black Letter Rules include: Rule 23.3 Cyber attacks against civilians is a war crime defined by rule 32.

Rule 26.7 The concept of “belonging to” defines whether you can be targeted or not. This rule defines civilians as off limits unless they are “engaged” in real war duties. It includes undeclared relationships where behavior makes it clear which side a person is fighting for.

rule 26.9 Virtual online communities and people expressing opinions do not qualify as combatants.

Rule 30 defines a cyber attack as a non-kinetic attack reasonably expected to cause damage or death to persons resulting from the attack. If attacker mistakenly calls civilians lawful targets, the attack on civilians still occurred. It is a crime. This is an important consideration considering how interconnected the internet has made people.

Rule 33 If there is doubt to the status of a person, that person is to be considered a civilian and not targetable.

Rule 35.5 Gathering information for the military makes you a combatant.

Journalists are prohibited targets.

Once an attack is made, the retribution is legal and does not necessarily need to be in kind. A cyber attack can be met with conventional weapons.

Rule 41 Means and Methods describes cyber weapons broadly as the means to carry out cyber war by use, or intended use of cyber “munitions” designed to cause damage, destruction, or death to its targets. The breadth of the rule is required because of the wide array of possible attacks through cyber means.

Is it treason to target and destroy the lives of fellow citizens of your country while in the employ of a foreign government while working as a military asset? The manual is clear that a cyber attack is a use of force if it causes physical harm to people or property.

If in this case the number of people just in the US targeted by freelancers like Weisburd is potentially over 250,000 people, is that below the threshold of what is called an attack? Around the world it scales up to over 1 million. And this is just one area cyber war is being waged.The manual spells out the right to defend and even launch a preemptive attack if you know a cyberattack is imminent.

Your Safety Net

Cyber war is real war and the general public of the US and every western nation is being attacked. Safety starts with the realization that it is your life, livelihood, and status in your own country that is at stake.

In the US, start by calling your congressman and senator. Demand to know why the US is giving billions of dollars to Ukraine when it is attacking US citizens. Demand that this funding cease. Should Americans give tax dollars to a regime that hires Americans as “soldiers” to attack them?

Demand that OSINT tools be regulated and taken out of free public access. The process can still be done, but it becomes slow and costly. The OSINT field needs to be regulated like doctors and lawyers are. Both professions answer to a board for misconduct and can lose their license to practice if guilty.

Taking OSINT tools out of public reach is also the only way to reform the NSA practices. The legal argument is this simple.

If a seven-year-old can use software, freeware, or a Microsoft Excel plugin to follow mommy when she goes Christmas shopping in real time, we (the State) deserve State sized tools. As the public tools become more invasive, the State capability grows in kind. The tools should be licensed.

Call the Police

If your home was being burglarized, even a mild mannered person would call the police to arrest the criminal.

Report this to the FBI. In Weisburd’s case, no one understood this in 2005. “Visit his local FBI field office online by clicking this linkor telephone them at (816) 512-8200. Ask to speak with Special Agent Marshall Stone and ask them why they have not investigated Weisburd for online terrorism. Point out that their failure to prosecute Weisburd is an example of the FBI’s current practice of not providing equal protection under the law, a violation of the US Constitution. Request information on how to file a formal complaint against Weisburd and follow through with the information.”

Report them to Homeland Securityas a threat to national security and to the Internet.

Investigations into this need to be done. According to the Tallinn Manual its a matter of whether or not your country chooses to respond. In the US, motive, means, and opportunity to commit crimes and very close to accompanying confessions are already in the mix.

The CIA, FBI, Homeland Security, NSA, and every other acronym will thank you for taking the time to do this. Since 9/11 these freelancers have been ruining real investigations, flooding the pipe with bad intelligence, false information, false accusations, and entrapment scenarios that still take massive amounts of time to invalidate.

Understand your Footprint

Using simple online tools like geosocialfootprint will give you a basic understanding about your safety. In this case, it samples Twitter- generated data. While only a small beginning, it will give you an idea where to start.

Call in the Cowboys

Contact OSINT websites and ethical hackers. Most of the people in these sectors are solid professionals. For websites if there are problems you may want to get a PEN test done and find your network vulnerabilities. OSINT professionals and web sites can give great advice.

It is the responsibility of the government to protect the people. Barring this, the 1st Amendment is only one of a few that are designed to protect the civilian population.

Criminal and civil investigations must happen. Class action lawsuits based on them against the groups, PACs, and politicians that support this must be considered.

Damn, this article is boring and stupid. You are a paranoid, delusional, obviously schizophrenic alternate reality certified aluminum-foil hat wearing pro-Russian troll. Go back to whatever rock you crawled out from and bash yourself in the head, liberally. Obviously it’s going to help your thinking process.

Scott Hafer

Who in their right mind is going to read all this crap? Obviously you have too much time on your hands, no girlfriend or wife and are narcissistic.

Have you ever thought about writing a book “I love me”?

Scott Hafer

I’ve never seen anyone tie in so many disparate themes into one “challenged” article as this. Is this four articles that nobody would publish, so you threw them all into one in a desperate attempt to get published?

It’s a good thing your name is not included with this article. Let’s just call you whackadoodle, shall we?

Hey, whackadoodle… get a life! This article sucks and Rinf is obviously desperate for crap to fill their site.

Rinf alternative news. Yeah, whackadoodle, this is the place for you. Alternate reality is your place. Privatized armies my [email protected]@, you have no clue, your research is based entirely on alternate reality sites and conspiracy theories must be your bread and butter.

Alternative news, perhaps you were wise not to include your name, whackadoodle. Then, forever after, your name would be associated with RT, PressTV and Uriminzokkiri. You know, credible know whacky news sites.

Mabus

well you, stupid Heifer, sure read it- and commented THREE times, which is more than anyone else, so obviously it struck a nerve.
or maybe youre one of the little dkkk gang stalkers referred to in the article?
I’d posit you’re a little dkkk gang-stalker wanna be freelancing for the CANARY MISSION or some such zio-skank outfit. Used to be called Internet Haganah by the zio-pimps of post 911 era

Scott Hafer

There is this modern invention called spell check, you might want to consider using it. You seem so obsessed with gay activities, you must be one. Congratulations!

You also might want to consider grammar lessons, English 101 or even staying off the internet. You capitalized heifer, so obviously you have an lust for cows. Posit? Such a big word for a dumbass. Did it take you all night to find that?

Ooh, post 911? Isn’t that now? Oh, you forgot to define how far out.
Three times. That’s the number of times you need to read something before you understand it. Go suck eggs. I’ll let you figure out how. Oh, sorry, you’re used to sucking dkkk.

Technosapphire

Hi Aaron!

WhiteDragonKing

Whether government or private I dont think it makes much of a difference. It’s still tyranny